SlideShare a Scribd company logo
Windows Server 2016
what is new in DNS (and IPv6 and DHCP)
1
© Men & Mice http://menandmice.com
Windows Server 2016
DNS Policies
Application Load-Distribution with DNS
IPv6 Root-Hints
DANE-Records Support
Support for Unknown DNS Records
Response-Rate-Limiting
Other new Features in Windows Server 2016
2
the features discussed here are based on the 

Technical Preview 5 (April 2016)
© Men & Mice http://menandmice.com
DNS Policies
DNS policies give fine control about how DNS queries should
be answered by a DNS server
• similar, but more powerful, than BIND 9 views
• Use-cases
• access control for DNS resolvers (prevent open resolver)
• DNS based load-distribution
• blackholing malicious clients
• Filter based on DNS domains or Query-Type
• Geo-Location-Aware DNS answers
• Traffic-Engineering based on time-of-day
• "Split-Brain" DNS configurations (CAUTION!)
3
© Men & Mice http://menandmice.com
DNS Policies
Every DNS zone can have one or more
"ZoneScopes"
• each ZoneScope can contain different DNS data (e.g.
different IP-Addresses for the same name)
• the DNS Policy defines, which ZoneScope is used when a
DNS query reaches the DNS server
4
© Men & Mice http://menandmice.com
DNS Policy criteria
5
Client Subnet Source address of the query
Transport Protocol either UDP or TCP
Internet Protocol either IPv4 or IPv6
Server Interface IP address
on which interface the query
comes in
domain name an FQDN (wildcards possible)
Query Type
the requested DNS record type
(A/AAAA/MX/SRV etc)
Time of Day Time when the query is received
© Men & Mice http://menandmice.com
DNS Policies
DNS Policy criteria can be combined with boolean
expressions ("AND", "OR", "NOT")
Powerful DNS policies are possible …
… that should be used carefully
6
© Men & Mice http://menandmice.com
DNS Policies Demo 1
7
restricting DNS 

recursion to subnets
© Men & Mice http://menandmice.com
DNS Policies Demo 1
Get-DnsServerRecursionScope -Name .

Set-DnsServerRecursionScope -Name . -EnableRecursion $False

Add-DnsServerRecursionScope -Name "Clients" -EnableRecursion $True


Add-DnsServerClientSubnet -Name "MyNetwork" `
-IPv4Subnet "172.22.1.0/24"
!
Add-DnsServerQueryResolutionPolicy -Name "ResolverPolicy" `

-Action ALLOW -ApplyOnRecursion -RecursionScope "Clients" `

-ClientSubnet "EQ,MyNetwork"
8
© Men & Mice http://menandmice.com
DNS Policies Demo 2
9
Application load distribution using DNS
© Men & Mice http://menandmice.com
DNS Policies Demo 2
Add-DnsServerZoneScope -ZoneName example.com -Name "scope1"

Add-DnsServerZoneScope -ZoneName example.com -Name "scope2"

Get-DnsServerZoneScope -ZoneName example.com
!
Add-DnsServerResourceRecord -A -Name www -ZoneName example.com -IPv4Address 192.0.2.10 `

-ZoneScope "scope1"

Add-DnsServerResourceRecord -A -Name www -ZoneName example.com -IPv4Address 192.0.2.20 `

-ZoneScope "scope2"


Add-DnsServerQueryResolutionPolicy -Name "Scope1LDPolicy" -ZoneName example.com `

-ZoneScope "scope1,4;scope,2" -Action ALLOW -ServerInterfaceIP "EQ,172.22.1.150"
!
Get-DnsServerQueryResolutionPolicy -ZoneName example.com
10
© Men & Mice http://menandmice.com
IPv6 root hints
Windows Server 2016 now comes with IPv6 root-
hints preconfigured
• root hints are required for every DNS server to find the
start of all DNS resolution
• Windows Server up to Windows 2012R2 only contain the
IPv4 root-hints for the Internet (however it was possible to
add the IPv6 root-hints manually)
• This change makes it possible to run the Windows DNS
server in an "IPv6-Only" network
11
© Men & Mice http://menandmice.com
DANE TLSA Record support
Windows Server 2016 adds support for the TLSA
Resource Record type
• TLSA is required for DANE (DNS Authenticated Named
Entities)
• "pinning" of TLS/SSL certificates via DNSSEC secured DNS
• see our previous webinar "DNSSEC & DANE – E-Mail
security reloaded" 

https://www.menandmice.com/resources/educational-resources/webinars/dnssec-and-dane-e-mail-security-reloaded/
12
© Men & Mice http://menandmice.com
Demo: TLSA record
13
© Men & Mice http://menandmice.com
Demo: TLSA Record
Add-DnsServerResourceRecord -Name _25._tcp `

-ZoneName example.com -TLSA -CertificateUsage DomainIssuedCertificate `

-Selector SubjectPublicKeyInfo -MatchingType Sha256Hash `

-CertificateAssociationData 831B809F32A1A9E8C52A5167A35A979F0719B89D08E9A3302264F99D
14
© Men & Mice http://menandmice.com
Support for "Unknown Resource
Records"
With new protocols, new DNS record types are added to
DNS
•URI
• SMIMEA and OPENPGPKEY
• TA and TALINK
• …
RFC 3597 "Handling of Unknown DNS Resource Record
(RR) Types" defines a way to provision a DNS server with
resource records unknown to the server software
15
© Men & Mice http://menandmice.com
Support for "Unknown Resource
Records"
the DNS server in Windows 2016 now supports
these unknown resource records
• enables DNS admins to support new protocols which were
not published at the release time of windows server
• the record data is given in hexadecimal notation
• the BIND 9 utility "named-rrchecker" can be used to convert
the data part of an DNS RR into the hexadecimal format
Example: definition of an IPv4 Address "A"-Record:
Add-DnsServerResourceRecord -Name www -ZoneName example.com -Type 1 -RecordData "0A000001"
16
© Men & Mice http://menandmice.com
Demo: Unknown RRs
17
© Men & Mice http://menandmice.com
Demo: Unknown RRs
The Uniform Resource Identifier (URI) DNS Resource
Record:
https://tools.ietf.org/html/rfc7553
!
> echo 'IN URI 10 1 "http://www.example.com/path"' | named-rrchecker -u

CLASS1 TYPE256 # 31 000a0001687474703a2f2f7777772e6578616d706c652e636f6d2f70617468
!
PowerShell> Add-DnsServerResourceRecord -Name _http._tcp -ZoneName example.com `

-Type 256 -RecordData "000a0001687474703a2f2f7777772e6578616d706c652e636f6d2f70617468"
18
© Men & Mice http://menandmice.com
Response Rate Limiting
DNS responses from DNS servers in the Internet
(Authoritative or DNS resolver) can be mis-used for
denial of service attacks
• A problem for a long time, but has been especially popular
with attackers in the last five years
• For additional coverage on this topic, watch our webinar
"The dangers of DNS reflection attacks" 



https://www.menandmice.com/resources/educational-resources/webinars/the-dangers-of-dns-reflection-attacks/
19
© Men & Mice http://menandmice.com
What is the problem
20
DNS is UDP "stateless"
communication
source IP addresses can be
spoofed
some DNS
Server in the Internet
Source IP
Address
"spoofed"
Answer is
delivered to the
owner of the
"spoofed" IP
Address
© Men & Mice http://menandmice.com
What is the problem
21
There are many many DNS
servers to be found in the Internet
© Men & Mice http://menandmice.com
One Solution: Response Rate Limiting (RRL)
• RRL was developed by Vernon Schryver and Paul Vixie
and implemented in BIND 9, NSD, Knot and PowerDNS. It
is now also available in Windows Server 2016.

• as all DNS queries should go through a caching server 

• identical queries should not be seen from the same
source inside the TTL (Time to Live) 

• if the DNS server sees (many) recurring queries within
the TTL, it is likely an attack
22
© Men & Mice http://menandmice.com
One Solution: Response Rate Limiting (RRL)
• response rate limiting counts the number of
identical responses sent to a given network

• will throttle outgoing responses if too much
identical responses are sent

• allows legit clients in the victims network to still
resolve DNS data
23
© Men & Mice http://menandmice.com
One Solution: Response Rate Limiting (RRL)
• in case an attack is detected, (almost) empty
answers are sent with "TC" flag set

• "TC" flag = answer truncated, retry over TCP

• real caching DNS server will repeat the query over
TCP (slower, but harder to spoof)
24
© Men & Mice http://menandmice.com
One Solution: Response Rate Limiting (RRL)
•RRL enabled on an authoritative server
25
© Men & Mice http://menandmice.com
Demo: RRL
26
© Men & Mice http://menandmice.com
Miscellaneous news
DHCP: Network Access Protection (NAP) has been removed
from DHCPv4 in Windows Server 2016
Containers with Docker: lightweight separation of
Applications on a single Windows Server 2016 instance (can be
used to separate a DNS or DHCP server)
Nano-Server: minimal Windows Server 2016 image without
GUI. Can be used to create a lightweight DNS-Server
deployment
Software Defined Networking (SDN) and Layer-4 Load-
Balancer: load-balance DNS server (for example DNS resolver)
27
© Men & Mice http://menandmice.com
Release Dates
Windows Server 2016 will be released in Q3 2016
Men & Mice Suite 7.3 (September 2016) will
support Windows Server 2016
Many of the new features will be supported in the
Men & Mice GUI and Web-UI
28
© Men & Mice http://menandmice.com
Upcoming Webinar
June 9th, 2016 - Yeti-DNS
!
Yet-DNS - an international research project 

on the DNS root-server system
Interview with Shane Kerr of BII
How-To participate in Yeti-DNS with a 

DNS resolver
29
© Men & Mice http://menandmice.com
Thank you!
!
Questions? Comments?
30

More Related Content

What's hot

Windows server
Windows serverWindows server
Windows server
Hideo Amezawa
 
Understanding the Windows Server Administration Fundamentals (Part-1)
Understanding the Windows Server Administration Fundamentals (Part-1)Understanding the Windows Server Administration Fundamentals (Part-1)
Understanding the Windows Server Administration Fundamentals (Part-1)
Tuan Yang
 
Understanding the Windows Server Administration Fundamentals (Part-2)
Understanding the Windows Server Administration Fundamentals (Part-2)Understanding the Windows Server Administration Fundamentals (Part-2)
Understanding the Windows Server Administration Fundamentals (Part-2)
Tuan Yang
 
DNS (Domain Name System)
DNS (Domain Name System)DNS (Domain Name System)
DNS (Domain Name System)
Shashidhara Vyakaranal
 
CDW: SAN vs. NAS
CDW: SAN vs. NASCDW: SAN vs. NAS
CDW: SAN vs. NAS
Spiceworks
 
Microsoft Active Directory
Microsoft Active DirectoryMicrosoft Active Directory
Microsoft Active Directorythebigredhemi
 
Windows 2019
Windows 2019Windows 2019
Windows 2019
Gary Williams
 
VMware virtual SAN 6 overview
VMware virtual SAN 6 overviewVMware virtual SAN 6 overview
VMware virtual SAN 6 overview
solarisyougood
 
Active directory slides
Active directory slidesActive directory slides
Active directory slides
Timothy Moffatt
 
Systems Administration
Systems AdministrationSystems Administration
Systems Administration
Mark John Lado, MIT
 
Introduction to Hyper-V
Introduction to Hyper-VIntroduction to Hyper-V
Introduction to Hyper-V
Mark Wilson
 
Install active directory on windows server 2016 step by step
Install active directory on windows server 2016  step by stepInstall active directory on windows server 2016  step by step
Install active directory on windows server 2016 step by step
Ahmed Abdelwahed
 
Installing and configuring a dhcp on windows server 2016 step by step
Installing and configuring a dhcp on windows server 2016 step by stepInstalling and configuring a dhcp on windows server 2016 step by step
Installing and configuring a dhcp on windows server 2016 step by step
Ahmed Abdelwahed
 
Introduction_of_ADDS
Introduction_of_ADDSIntroduction_of_ADDS
Introduction_of_ADDSHarsh Sethi
 
VMware Virtual SAN Presentation
VMware Virtual SAN PresentationVMware Virtual SAN Presentation
VMware Virtual SAN Presentation
virtualsouthwest
 
Introduction to Active Directory
Introduction to Active DirectoryIntroduction to Active Directory
Introduction to Active Directory
thoms1i
 
Active Directory
Active DirectoryActive Directory
Active Directory
Small World Group L.L.C
 
DNS - Domain Name System
DNS - Domain Name SystemDNS - Domain Name System
DNS - Domain Name System
Peter R. Egli
 
History of Windows Server
History of Windows ServerHistory of Windows Server
History of Windows Server
sundas Shabbir
 
Windows Server 2012
Windows Server 2012Windows Server 2012
Windows Server 2012
anilinvns
 

What's hot (20)

Windows server
Windows serverWindows server
Windows server
 
Understanding the Windows Server Administration Fundamentals (Part-1)
Understanding the Windows Server Administration Fundamentals (Part-1)Understanding the Windows Server Administration Fundamentals (Part-1)
Understanding the Windows Server Administration Fundamentals (Part-1)
 
Understanding the Windows Server Administration Fundamentals (Part-2)
Understanding the Windows Server Administration Fundamentals (Part-2)Understanding the Windows Server Administration Fundamentals (Part-2)
Understanding the Windows Server Administration Fundamentals (Part-2)
 
DNS (Domain Name System)
DNS (Domain Name System)DNS (Domain Name System)
DNS (Domain Name System)
 
CDW: SAN vs. NAS
CDW: SAN vs. NASCDW: SAN vs. NAS
CDW: SAN vs. NAS
 
Microsoft Active Directory
Microsoft Active DirectoryMicrosoft Active Directory
Microsoft Active Directory
 
Windows 2019
Windows 2019Windows 2019
Windows 2019
 
VMware virtual SAN 6 overview
VMware virtual SAN 6 overviewVMware virtual SAN 6 overview
VMware virtual SAN 6 overview
 
Active directory slides
Active directory slidesActive directory slides
Active directory slides
 
Systems Administration
Systems AdministrationSystems Administration
Systems Administration
 
Introduction to Hyper-V
Introduction to Hyper-VIntroduction to Hyper-V
Introduction to Hyper-V
 
Install active directory on windows server 2016 step by step
Install active directory on windows server 2016  step by stepInstall active directory on windows server 2016  step by step
Install active directory on windows server 2016 step by step
 
Installing and configuring a dhcp on windows server 2016 step by step
Installing and configuring a dhcp on windows server 2016 step by stepInstalling and configuring a dhcp on windows server 2016 step by step
Installing and configuring a dhcp on windows server 2016 step by step
 
Introduction_of_ADDS
Introduction_of_ADDSIntroduction_of_ADDS
Introduction_of_ADDS
 
VMware Virtual SAN Presentation
VMware Virtual SAN PresentationVMware Virtual SAN Presentation
VMware Virtual SAN Presentation
 
Introduction to Active Directory
Introduction to Active DirectoryIntroduction to Active Directory
Introduction to Active Directory
 
Active Directory
Active DirectoryActive Directory
Active Directory
 
DNS - Domain Name System
DNS - Domain Name SystemDNS - Domain Name System
DNS - Domain Name System
 
History of Windows Server
History of Windows ServerHistory of Windows Server
History of Windows Server
 
Windows Server 2012
Windows Server 2012Windows Server 2012
Windows Server 2012
 

Viewers also liked

OISF: Regular Expressions (Regex) Overview
OISF: Regular Expressions (Regex) OverviewOISF: Regular Expressions (Regex) Overview
OISF: Regular Expressions (Regex) Overview
ThreatReel Podcast
 
Cisco Connect Toronto 2017 - Accelerating Incident Response in Organizations...
Cisco Connect Toronto  2017 - Accelerating Incident Response in Organizations...Cisco Connect Toronto  2017 - Accelerating Incident Response in Organizations...
Cisco Connect Toronto 2017 - Accelerating Incident Response in Organizations...
Cisco Canada
 
Comodo Multi Domain SSL Certificate: Key Features by CheapSSLsecurity
Comodo Multi Domain SSL Certificate: Key Features by CheapSSLsecurityComodo Multi Domain SSL Certificate: Key Features by CheapSSLsecurity
Comodo Multi Domain SSL Certificate: Key Features by CheapSSLsecurity
CheapSSLsecurity
 
DNS High-Availability Tools - Open-Source Load Balancing Solutions
DNS High-Availability Tools - Open-Source Load Balancing SolutionsDNS High-Availability Tools - Open-Source Load Balancing Solutions
DNS High-Availability Tools - Open-Source Load Balancing Solutions
Men and Mice
 
DerbyCon 7.0 Legacy: Regular Expressions (Regex) Overview
DerbyCon 7.0 Legacy: Regular Expressions (Regex) OverviewDerbyCon 7.0 Legacy: Regular Expressions (Regex) Overview
DerbyCon 7.0 Legacy: Regular Expressions (Regex) Overview
ThreatReel Podcast
 
Symantec (ISTR) Internet Security Threat Report Volume 22
Symantec (ISTR) Internet Security Threat Report Volume 22Symantec (ISTR) Internet Security Threat Report Volume 22
Symantec (ISTR) Internet Security Threat Report Volume 22
CheapSSLsecurity
 
Scripting and automation with the Men & Mice Suite
Scripting and automation with the Men & Mice SuiteScripting and automation with the Men & Mice Suite
Scripting and automation with the Men & Mice Suite
Men and Mice
 
(ISC)2 Cincinnati Tri-State Chapter: Phishing Forensics - Is it just suspicio...
(ISC)2 Cincinnati Tri-State Chapter: Phishing Forensics - Is it just suspicio...(ISC)2 Cincinnati Tri-State Chapter: Phishing Forensics - Is it just suspicio...
(ISC)2 Cincinnati Tri-State Chapter: Phishing Forensics - Is it just suspicio...
ThreatReel Podcast
 
Role of DNS in Botnet Command and Control
Role of DNS in Botnet Command and ControlRole of DNS in Botnet Command and Control
Role of DNS in Botnet Command and Control
OpenDNS
 
Umbrella Webcast: Redefining Security for the Nomadic Worker
Umbrella Webcast: Redefining Security for the Nomadic WorkerUmbrella Webcast: Redefining Security for the Nomadic Worker
Umbrella Webcast: Redefining Security for the Nomadic WorkerOpenDNS
 
Dns Hardening Linux Os
Dns Hardening   Linux OsDns Hardening   Linux Os
Dns Hardening Linux Os
ecarrow
 
Tcp udp
Tcp udpTcp udp
Tcp udp
Programmer
 
Cyber Security # Lec 2
Cyber Security # Lec 2Cyber Security # Lec 2
Cyber Security # Lec 2
Kabul Education University
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
Avani Patel
 
Cisco Connect Toronto 2017 - Anatomy-of-attack
Cisco Connect Toronto 2017 - Anatomy-of-attackCisco Connect Toronto 2017 - Anatomy-of-attack
Cisco Connect Toronto 2017 - Anatomy-of-attack
Cisco Canada
 
Social Networks And Phishing
Social Networks And PhishingSocial Networks And Phishing
Social Networks And Phishing
ecarrow
 
Microsoft Cyber Security IT-Camp
Microsoft Cyber Security IT-CampMicrosoft Cyber Security IT-Camp
Microsoft Cyber Security IT-Camp
Alexander Benoit
 
How to send DNS over anything encrypted
How to send DNS over anything encryptedHow to send DNS over anything encrypted
How to send DNS over anything encrypted
Men and Mice
 
Phishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You SafePhishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You Safe
CheapSSLsecurity
 
Cisco umbrella overview
Cisco umbrella overviewCisco umbrella overview
Cisco umbrella overview
Cisco Canada
 

Viewers also liked (20)

OISF: Regular Expressions (Regex) Overview
OISF: Regular Expressions (Regex) OverviewOISF: Regular Expressions (Regex) Overview
OISF: Regular Expressions (Regex) Overview
 
Cisco Connect Toronto 2017 - Accelerating Incident Response in Organizations...
Cisco Connect Toronto  2017 - Accelerating Incident Response in Organizations...Cisco Connect Toronto  2017 - Accelerating Incident Response in Organizations...
Cisco Connect Toronto 2017 - Accelerating Incident Response in Organizations...
 
Comodo Multi Domain SSL Certificate: Key Features by CheapSSLsecurity
Comodo Multi Domain SSL Certificate: Key Features by CheapSSLsecurityComodo Multi Domain SSL Certificate: Key Features by CheapSSLsecurity
Comodo Multi Domain SSL Certificate: Key Features by CheapSSLsecurity
 
DNS High-Availability Tools - Open-Source Load Balancing Solutions
DNS High-Availability Tools - Open-Source Load Balancing SolutionsDNS High-Availability Tools - Open-Source Load Balancing Solutions
DNS High-Availability Tools - Open-Source Load Balancing Solutions
 
DerbyCon 7.0 Legacy: Regular Expressions (Regex) Overview
DerbyCon 7.0 Legacy: Regular Expressions (Regex) OverviewDerbyCon 7.0 Legacy: Regular Expressions (Regex) Overview
DerbyCon 7.0 Legacy: Regular Expressions (Regex) Overview
 
Symantec (ISTR) Internet Security Threat Report Volume 22
Symantec (ISTR) Internet Security Threat Report Volume 22Symantec (ISTR) Internet Security Threat Report Volume 22
Symantec (ISTR) Internet Security Threat Report Volume 22
 
Scripting and automation with the Men & Mice Suite
Scripting and automation with the Men & Mice SuiteScripting and automation with the Men & Mice Suite
Scripting and automation with the Men & Mice Suite
 
(ISC)2 Cincinnati Tri-State Chapter: Phishing Forensics - Is it just suspicio...
(ISC)2 Cincinnati Tri-State Chapter: Phishing Forensics - Is it just suspicio...(ISC)2 Cincinnati Tri-State Chapter: Phishing Forensics - Is it just suspicio...
(ISC)2 Cincinnati Tri-State Chapter: Phishing Forensics - Is it just suspicio...
 
Role of DNS in Botnet Command and Control
Role of DNS in Botnet Command and ControlRole of DNS in Botnet Command and Control
Role of DNS in Botnet Command and Control
 
Umbrella Webcast: Redefining Security for the Nomadic Worker
Umbrella Webcast: Redefining Security for the Nomadic WorkerUmbrella Webcast: Redefining Security for the Nomadic Worker
Umbrella Webcast: Redefining Security for the Nomadic Worker
 
Dns Hardening Linux Os
Dns Hardening   Linux OsDns Hardening   Linux Os
Dns Hardening Linux Os
 
Tcp udp
Tcp udpTcp udp
Tcp udp
 
Cyber Security # Lec 2
Cyber Security # Lec 2Cyber Security # Lec 2
Cyber Security # Lec 2
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
Cisco Connect Toronto 2017 - Anatomy-of-attack
Cisco Connect Toronto 2017 - Anatomy-of-attackCisco Connect Toronto 2017 - Anatomy-of-attack
Cisco Connect Toronto 2017 - Anatomy-of-attack
 
Social Networks And Phishing
Social Networks And PhishingSocial Networks And Phishing
Social Networks And Phishing
 
Microsoft Cyber Security IT-Camp
Microsoft Cyber Security IT-CampMicrosoft Cyber Security IT-Camp
Microsoft Cyber Security IT-Camp
 
How to send DNS over anything encrypted
How to send DNS over anything encryptedHow to send DNS over anything encrypted
How to send DNS over anything encrypted
 
Phishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You SafePhishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You Safe
 
Cisco umbrella overview
Cisco umbrella overviewCisco umbrella overview
Cisco umbrella overview
 

Similar to Windows Server 2016 Webinar

Windows 2012 and DNSSEC
Windows 2012 and DNSSECWindows 2012 and DNSSEC
Windows 2012 and DNSSEC
Men and Mice
 
DNSSEC Tutorial, by Champika Wijayatunga [APNIC 38]
DNSSEC Tutorial, by Champika Wijayatunga [APNIC 38]DNSSEC Tutorial, by Champika Wijayatunga [APNIC 38]
DNSSEC Tutorial, by Champika Wijayatunga [APNIC 38]
APNIC
 
ION Islamabad - Deploying DNSSEC
ION Islamabad - Deploying DNSSECION Islamabad - Deploying DNSSEC
ION Islamabad - Deploying DNSSEC
Deploy360 Programme (Internet Society)
 
DNSSEC signing Tutorial
DNSSEC signing Tutorial DNSSEC signing Tutorial
DNSSEC signing Tutorial
Men and Mice
 
Quad9 and DNS Privacy
Quad9 and DNS PrivacyQuad9 and DNS Privacy
Understanding and Deploying DNSSEC, by Champika Wijayatunga [APRICOT 2015]
Understanding and Deploying DNSSEC, by Champika Wijayatunga [APRICOT 2015]Understanding and Deploying DNSSEC, by Champika Wijayatunga [APRICOT 2015]
Understanding and Deploying DNSSEC, by Champika Wijayatunga [APRICOT 2015]
APNIC
 
The DNSSEC KSK of the root rolls
The DNSSEC KSK of the root rollsThe DNSSEC KSK of the root rolls
The DNSSEC KSK of the root rolls
Men and Mice
 
DNSTap Webinar
DNSTap WebinarDNSTap Webinar
DNSTap Webinar
Men and Mice
 
8 technical-dns-workshop-day4
8 technical-dns-workshop-day48 technical-dns-workshop-day4
8 technical-dns-workshop-day4
DNS Entrepreneurship Center
 
RIPE 71 and IETF 94 reports webinar
RIPE 71 and IETF 94 reports webinarRIPE 71 and IETF 94 reports webinar
RIPE 71 and IETF 94 reports webinar
Men and Mice
 
ION Bucharest - Deploying DNSSEC
ION Bucharest - Deploying DNSSECION Bucharest - Deploying DNSSEC
ION Bucharest - Deploying DNSSEC
Deploy360 Programme (Internet Society)
 
ION Hangzhou - Why Deploy DNSSEC?
ION Hangzhou - Why Deploy DNSSEC?ION Hangzhou - Why Deploy DNSSEC?
ION Hangzhou - Why Deploy DNSSEC?
Deploy360 Programme (Internet Society)
 
The DNS of Things
The DNS of ThingsThe DNS of Things
The DNS of Things
F5 Networks
 
DNS - MCSE 2019
DNS - MCSE 2019DNS - MCSE 2019
DNS - MCSE 2019
Milad Es'Haghi
 
The DNS of Things
The DNS of ThingsThe DNS of Things
The DNS of ThingsPeter Silva
 
How to choose the right IPAM for your organization final
How to choose the right IPAM for your organization finalHow to choose the right IPAM for your organization final
How to choose the right IPAM for your organization final
Michal Hrncirik
 
Encrypted DNS - DNS over TLS / DNS over HTTPS
Encrypted DNS - DNS over TLS / DNS over HTTPSEncrypted DNS - DNS over TLS / DNS over HTTPS
Encrypted DNS - DNS over TLS / DNS over HTTPS
Alex Mayrhofer
 
DNS / DNSSEC / DANE / DPRIVE Results at IETF93 Hackathon
DNS / DNSSEC / DANE / DPRIVE Results at IETF93 HackathonDNS / DNSSEC / DANE / DPRIVE Results at IETF93 Hackathon
DNS / DNSSEC / DANE / DPRIVE Results at IETF93 Hackathon
Dan York
 
EDNS (in)Compatibility: Adventures in Protocol Extension
EDNS (in)Compatibility: Adventures in Protocol ExtensionEDNS (in)Compatibility: Adventures in Protocol Extension
EDNS (in)Compatibility: Adventures in Protocol Extension
APNIC
 

Similar to Windows Server 2016 Webinar (20)

Windows 2012 and DNSSEC
Windows 2012 and DNSSECWindows 2012 and DNSSEC
Windows 2012 and DNSSEC
 
DNSSEC Tutorial, by Champika Wijayatunga [APNIC 38]
DNSSEC Tutorial, by Champika Wijayatunga [APNIC 38]DNSSEC Tutorial, by Champika Wijayatunga [APNIC 38]
DNSSEC Tutorial, by Champika Wijayatunga [APNIC 38]
 
ION Islamabad - Deploying DNSSEC
ION Islamabad - Deploying DNSSECION Islamabad - Deploying DNSSEC
ION Islamabad - Deploying DNSSEC
 
DNSSEC signing Tutorial
DNSSEC signing Tutorial DNSSEC signing Tutorial
DNSSEC signing Tutorial
 
Quad9 and DNS Privacy
Quad9 and DNS PrivacyQuad9 and DNS Privacy
Quad9 and DNS Privacy
 
Understanding and Deploying DNSSEC, by Champika Wijayatunga [APRICOT 2015]
Understanding and Deploying DNSSEC, by Champika Wijayatunga [APRICOT 2015]Understanding and Deploying DNSSEC, by Champika Wijayatunga [APRICOT 2015]
Understanding and Deploying DNSSEC, by Champika Wijayatunga [APRICOT 2015]
 
The DNSSEC KSK of the root rolls
The DNSSEC KSK of the root rollsThe DNSSEC KSK of the root rolls
The DNSSEC KSK of the root rolls
 
DNSTap Webinar
DNSTap WebinarDNSTap Webinar
DNSTap Webinar
 
8 technical-dns-workshop-day4
8 technical-dns-workshop-day48 technical-dns-workshop-day4
8 technical-dns-workshop-day4
 
RIPE 71 and IETF 94 reports webinar
RIPE 71 and IETF 94 reports webinarRIPE 71 and IETF 94 reports webinar
RIPE 71 and IETF 94 reports webinar
 
ION Bucharest - Deploying DNSSEC
ION Bucharest - Deploying DNSSECION Bucharest - Deploying DNSSEC
ION Bucharest - Deploying DNSSEC
 
ION Hangzhou - Why Deploy DNSSEC?
ION Hangzhou - Why Deploy DNSSEC?ION Hangzhou - Why Deploy DNSSEC?
ION Hangzhou - Why Deploy DNSSEC?
 
The DNS of Things
The DNS of ThingsThe DNS of Things
The DNS of Things
 
DNS - MCSE 2019
DNS - MCSE 2019DNS - MCSE 2019
DNS - MCSE 2019
 
The DNS of Things
The DNS of ThingsThe DNS of Things
The DNS of Things
 
RP11_XaviertTorrentGorjon
RP11_XaviertTorrentGorjonRP11_XaviertTorrentGorjon
RP11_XaviertTorrentGorjon
 
How to choose the right IPAM for your organization final
How to choose the right IPAM for your organization finalHow to choose the right IPAM for your organization final
How to choose the right IPAM for your organization final
 
Encrypted DNS - DNS over TLS / DNS over HTTPS
Encrypted DNS - DNS over TLS / DNS over HTTPSEncrypted DNS - DNS over TLS / DNS over HTTPS
Encrypted DNS - DNS over TLS / DNS over HTTPS
 
DNS / DNSSEC / DANE / DPRIVE Results at IETF93 Hackathon
DNS / DNSSEC / DANE / DPRIVE Results at IETF93 HackathonDNS / DNSSEC / DANE / DPRIVE Results at IETF93 Hackathon
DNS / DNSSEC / DANE / DPRIVE Results at IETF93 Hackathon
 
EDNS (in)Compatibility: Adventures in Protocol Extension
EDNS (in)Compatibility: Adventures in Protocol ExtensionEDNS (in)Compatibility: Adventures in Protocol Extension
EDNS (in)Compatibility: Adventures in Protocol Extension
 

More from Men and Mice

Cisco Live 2019: New Best Practices for Hybrid and Multicloud Network Strategies
Cisco Live 2019: New Best Practices for Hybrid and Multicloud Network StrategiesCisco Live 2019: New Best Practices for Hybrid and Multicloud Network Strategies
Cisco Live 2019: New Best Practices for Hybrid and Multicloud Network Strategies
Men and Mice
 
Part 3 - Local Name Resolution in Linux, FreeBSD and macOS/iOS
Part 3 - Local Name Resolution in Linux, FreeBSD and macOS/iOSPart 3 - Local Name Resolution in Linux, FreeBSD and macOS/iOS
Part 3 - Local Name Resolution in Linux, FreeBSD and macOS/iOS
Men and Mice
 
Part 2 - Local Name Resolution in Windows Networks
Part 2 - Local Name Resolution in Windows NetworksPart 2 - Local Name Resolution in Windows Networks
Part 2 - Local Name Resolution in Windows Networks
Men and Mice
 
Namespaces for Local Networks
Namespaces for Local NetworksNamespaces for Local Networks
Namespaces for Local Networks
Men and Mice
 
The CAA-Record for increased encryption security
The CAA-Record for increased encryption securityThe CAA-Record for increased encryption security
The CAA-Record for increased encryption security
Men and Mice
 
SMTP STS (Strict Transport Security) vs. SMTP with DANE
SMTP STS (Strict Transport Security) vs. SMTP with DANESMTP STS (Strict Transport Security) vs. SMTP with DANE
SMTP STS (Strict Transport Security) vs. SMTP with DANE
Men and Mice
 
BIND 9 logging best practices
BIND 9 logging best practicesBIND 9 logging best practices
BIND 9 logging best practices
Men and Mice
 
Fighting Abuse with DNS
Fighting Abuse with DNSFighting Abuse with DNS
Fighting Abuse with DNS
Men and Mice
 
What is new in BIND 9.11?
What is new in BIND 9.11?What is new in BIND 9.11?
What is new in BIND 9.11?
Men and Mice
 
Yeti DNS - Experimenting at the root
Yeti DNS - Experimenting at the rootYeti DNS - Experimenting at the root
Yeti DNS - Experimenting at the root
Men and Mice
 
Kea DHCP – the new open source DHCP server from ISC
Kea DHCP – the new open source DHCP server from ISCKea DHCP – the new open source DHCP server from ISC
Kea DHCP – the new open source DHCP server from ISC
Men and Mice
 
Keeping DNS server up-and-running with “runit
Keeping DNS server up-and-running with “runitKeeping DNS server up-and-running with “runit
Keeping DNS server up-and-running with “runit
Men and Mice
 
PowerDNS Webinar - Part 2
PowerDNS Webinar - Part 2PowerDNS Webinar - Part 2
PowerDNS Webinar - Part 2
Men and Mice
 
PowerDNS Webinar
PowerDNS Webinar PowerDNS Webinar
PowerDNS Webinar
Men and Mice
 
IETF 93 Review Webinar
IETF 93 Review WebinarIETF 93 Review Webinar
IETF 93 Review Webinar
Men and Mice
 
RIPE 70 Report Webinar
RIPE 70 Report WebinarRIPE 70 Report Webinar
RIPE 70 Report Webinar
Men and Mice
 
DNSSEC best practices Webinar
DNSSEC best practices WebinarDNSSEC best practices Webinar
DNSSEC best practices Webinar
Men and Mice
 
IETF 92 Webinar
IETF 92 WebinarIETF 92 Webinar
IETF 92 Webinar
Men and Mice
 
The KNOT DNS Server
The KNOT DNS ServerThe KNOT DNS Server
The KNOT DNS Server
Men and Mice
 
RIPE 69 & IETF 91 Webinar - DNS-Privacy, IPv6, DANE and DHCP(v6)
RIPE 69 & IETF 91 Webinar - DNS-Privacy, IPv6, DANE and DHCP(v6)RIPE 69 & IETF 91 Webinar - DNS-Privacy, IPv6, DANE and DHCP(v6)
RIPE 69 & IETF 91 Webinar - DNS-Privacy, IPv6, DANE and DHCP(v6)
Men and Mice
 

More from Men and Mice (20)

Cisco Live 2019: New Best Practices for Hybrid and Multicloud Network Strategies
Cisco Live 2019: New Best Practices for Hybrid and Multicloud Network StrategiesCisco Live 2019: New Best Practices for Hybrid and Multicloud Network Strategies
Cisco Live 2019: New Best Practices for Hybrid and Multicloud Network Strategies
 
Part 3 - Local Name Resolution in Linux, FreeBSD and macOS/iOS
Part 3 - Local Name Resolution in Linux, FreeBSD and macOS/iOSPart 3 - Local Name Resolution in Linux, FreeBSD and macOS/iOS
Part 3 - Local Name Resolution in Linux, FreeBSD and macOS/iOS
 
Part 2 - Local Name Resolution in Windows Networks
Part 2 - Local Name Resolution in Windows NetworksPart 2 - Local Name Resolution in Windows Networks
Part 2 - Local Name Resolution in Windows Networks
 
Namespaces for Local Networks
Namespaces for Local NetworksNamespaces for Local Networks
Namespaces for Local Networks
 
The CAA-Record for increased encryption security
The CAA-Record for increased encryption securityThe CAA-Record for increased encryption security
The CAA-Record for increased encryption security
 
SMTP STS (Strict Transport Security) vs. SMTP with DANE
SMTP STS (Strict Transport Security) vs. SMTP with DANESMTP STS (Strict Transport Security) vs. SMTP with DANE
SMTP STS (Strict Transport Security) vs. SMTP with DANE
 
BIND 9 logging best practices
BIND 9 logging best practicesBIND 9 logging best practices
BIND 9 logging best practices
 
Fighting Abuse with DNS
Fighting Abuse with DNSFighting Abuse with DNS
Fighting Abuse with DNS
 
What is new in BIND 9.11?
What is new in BIND 9.11?What is new in BIND 9.11?
What is new in BIND 9.11?
 
Yeti DNS - Experimenting at the root
Yeti DNS - Experimenting at the rootYeti DNS - Experimenting at the root
Yeti DNS - Experimenting at the root
 
Kea DHCP – the new open source DHCP server from ISC
Kea DHCP – the new open source DHCP server from ISCKea DHCP – the new open source DHCP server from ISC
Kea DHCP – the new open source DHCP server from ISC
 
Keeping DNS server up-and-running with “runit
Keeping DNS server up-and-running with “runitKeeping DNS server up-and-running with “runit
Keeping DNS server up-and-running with “runit
 
PowerDNS Webinar - Part 2
PowerDNS Webinar - Part 2PowerDNS Webinar - Part 2
PowerDNS Webinar - Part 2
 
PowerDNS Webinar
PowerDNS Webinar PowerDNS Webinar
PowerDNS Webinar
 
IETF 93 Review Webinar
IETF 93 Review WebinarIETF 93 Review Webinar
IETF 93 Review Webinar
 
RIPE 70 Report Webinar
RIPE 70 Report WebinarRIPE 70 Report Webinar
RIPE 70 Report Webinar
 
DNSSEC best practices Webinar
DNSSEC best practices WebinarDNSSEC best practices Webinar
DNSSEC best practices Webinar
 
IETF 92 Webinar
IETF 92 WebinarIETF 92 Webinar
IETF 92 Webinar
 
The KNOT DNS Server
The KNOT DNS ServerThe KNOT DNS Server
The KNOT DNS Server
 
RIPE 69 & IETF 91 Webinar - DNS-Privacy, IPv6, DANE and DHCP(v6)
RIPE 69 & IETF 91 Webinar - DNS-Privacy, IPv6, DANE and DHCP(v6)RIPE 69 & IETF 91 Webinar - DNS-Privacy, IPv6, DANE and DHCP(v6)
RIPE 69 & IETF 91 Webinar - DNS-Privacy, IPv6, DANE and DHCP(v6)
 

Recently uploaded

Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 

Recently uploaded (20)

Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 

Windows Server 2016 Webinar

  • 1. Windows Server 2016 what is new in DNS (and IPv6 and DHCP) 1
  • 2. © Men & Mice http://menandmice.com Windows Server 2016 DNS Policies Application Load-Distribution with DNS IPv6 Root-Hints DANE-Records Support Support for Unknown DNS Records Response-Rate-Limiting Other new Features in Windows Server 2016 2 the features discussed here are based on the 
 Technical Preview 5 (April 2016)
  • 3. © Men & Mice http://menandmice.com DNS Policies DNS policies give fine control about how DNS queries should be answered by a DNS server • similar, but more powerful, than BIND 9 views • Use-cases • access control for DNS resolvers (prevent open resolver) • DNS based load-distribution • blackholing malicious clients • Filter based on DNS domains or Query-Type • Geo-Location-Aware DNS answers • Traffic-Engineering based on time-of-day • "Split-Brain" DNS configurations (CAUTION!) 3
  • 4. © Men & Mice http://menandmice.com DNS Policies Every DNS zone can have one or more "ZoneScopes" • each ZoneScope can contain different DNS data (e.g. different IP-Addresses for the same name) • the DNS Policy defines, which ZoneScope is used when a DNS query reaches the DNS server 4
  • 5. © Men & Mice http://menandmice.com DNS Policy criteria 5 Client Subnet Source address of the query Transport Protocol either UDP or TCP Internet Protocol either IPv4 or IPv6 Server Interface IP address on which interface the query comes in domain name an FQDN (wildcards possible) Query Type the requested DNS record type (A/AAAA/MX/SRV etc) Time of Day Time when the query is received
  • 6. © Men & Mice http://menandmice.com DNS Policies DNS Policy criteria can be combined with boolean expressions ("AND", "OR", "NOT") Powerful DNS policies are possible … … that should be used carefully 6
  • 7. © Men & Mice http://menandmice.com DNS Policies Demo 1 7 restricting DNS 
 recursion to subnets
  • 8. © Men & Mice http://menandmice.com DNS Policies Demo 1 Get-DnsServerRecursionScope -Name .
 Set-DnsServerRecursionScope -Name . -EnableRecursion $False
 Add-DnsServerRecursionScope -Name "Clients" -EnableRecursion $True 
 Add-DnsServerClientSubnet -Name "MyNetwork" ` -IPv4Subnet "172.22.1.0/24" ! Add-DnsServerQueryResolutionPolicy -Name "ResolverPolicy" `
 -Action ALLOW -ApplyOnRecursion -RecursionScope "Clients" `
 -ClientSubnet "EQ,MyNetwork" 8
  • 9. © Men & Mice http://menandmice.com DNS Policies Demo 2 9 Application load distribution using DNS
  • 10. © Men & Mice http://menandmice.com DNS Policies Demo 2 Add-DnsServerZoneScope -ZoneName example.com -Name "scope1"
 Add-DnsServerZoneScope -ZoneName example.com -Name "scope2"
 Get-DnsServerZoneScope -ZoneName example.com ! Add-DnsServerResourceRecord -A -Name www -ZoneName example.com -IPv4Address 192.0.2.10 `
 -ZoneScope "scope1"
 Add-DnsServerResourceRecord -A -Name www -ZoneName example.com -IPv4Address 192.0.2.20 `
 -ZoneScope "scope2" 
 Add-DnsServerQueryResolutionPolicy -Name "Scope1LDPolicy" -ZoneName example.com `
 -ZoneScope "scope1,4;scope,2" -Action ALLOW -ServerInterfaceIP "EQ,172.22.1.150" ! Get-DnsServerQueryResolutionPolicy -ZoneName example.com 10
  • 11. © Men & Mice http://menandmice.com IPv6 root hints Windows Server 2016 now comes with IPv6 root- hints preconfigured • root hints are required for every DNS server to find the start of all DNS resolution • Windows Server up to Windows 2012R2 only contain the IPv4 root-hints for the Internet (however it was possible to add the IPv6 root-hints manually) • This change makes it possible to run the Windows DNS server in an "IPv6-Only" network 11
  • 12. © Men & Mice http://menandmice.com DANE TLSA Record support Windows Server 2016 adds support for the TLSA Resource Record type • TLSA is required for DANE (DNS Authenticated Named Entities) • "pinning" of TLS/SSL certificates via DNSSEC secured DNS • see our previous webinar "DNSSEC & DANE – E-Mail security reloaded" 
 https://www.menandmice.com/resources/educational-resources/webinars/dnssec-and-dane-e-mail-security-reloaded/ 12
  • 13. © Men & Mice http://menandmice.com Demo: TLSA record 13
  • 14. © Men & Mice http://menandmice.com Demo: TLSA Record Add-DnsServerResourceRecord -Name _25._tcp `
 -ZoneName example.com -TLSA -CertificateUsage DomainIssuedCertificate `
 -Selector SubjectPublicKeyInfo -MatchingType Sha256Hash `
 -CertificateAssociationData 831B809F32A1A9E8C52A5167A35A979F0719B89D08E9A3302264F99D 14
  • 15. © Men & Mice http://menandmice.com Support for "Unknown Resource Records" With new protocols, new DNS record types are added to DNS •URI • SMIMEA and OPENPGPKEY • TA and TALINK • … RFC 3597 "Handling of Unknown DNS Resource Record (RR) Types" defines a way to provision a DNS server with resource records unknown to the server software 15
  • 16. © Men & Mice http://menandmice.com Support for "Unknown Resource Records" the DNS server in Windows 2016 now supports these unknown resource records • enables DNS admins to support new protocols which were not published at the release time of windows server • the record data is given in hexadecimal notation • the BIND 9 utility "named-rrchecker" can be used to convert the data part of an DNS RR into the hexadecimal format Example: definition of an IPv4 Address "A"-Record: Add-DnsServerResourceRecord -Name www -ZoneName example.com -Type 1 -RecordData "0A000001" 16
  • 17. © Men & Mice http://menandmice.com Demo: Unknown RRs 17
  • 18. © Men & Mice http://menandmice.com Demo: Unknown RRs The Uniform Resource Identifier (URI) DNS Resource Record: https://tools.ietf.org/html/rfc7553 ! > echo 'IN URI 10 1 "http://www.example.com/path"' | named-rrchecker -u
 CLASS1 TYPE256 # 31 000a0001687474703a2f2f7777772e6578616d706c652e636f6d2f70617468 ! PowerShell> Add-DnsServerResourceRecord -Name _http._tcp -ZoneName example.com `
 -Type 256 -RecordData "000a0001687474703a2f2f7777772e6578616d706c652e636f6d2f70617468" 18
  • 19. © Men & Mice http://menandmice.com Response Rate Limiting DNS responses from DNS servers in the Internet (Authoritative or DNS resolver) can be mis-used for denial of service attacks • A problem for a long time, but has been especially popular with attackers in the last five years • For additional coverage on this topic, watch our webinar "The dangers of DNS reflection attacks" 
 
 https://www.menandmice.com/resources/educational-resources/webinars/the-dangers-of-dns-reflection-attacks/ 19
  • 20. © Men & Mice http://menandmice.com What is the problem 20 DNS is UDP "stateless" communication source IP addresses can be spoofed some DNS Server in the Internet Source IP Address "spoofed" Answer is delivered to the owner of the "spoofed" IP Address
  • 21. © Men & Mice http://menandmice.com What is the problem 21 There are many many DNS servers to be found in the Internet
  • 22. © Men & Mice http://menandmice.com One Solution: Response Rate Limiting (RRL) • RRL was developed by Vernon Schryver and Paul Vixie and implemented in BIND 9, NSD, Knot and PowerDNS. It is now also available in Windows Server 2016.
 • as all DNS queries should go through a caching server 
 • identical queries should not be seen from the same source inside the TTL (Time to Live) 
 • if the DNS server sees (many) recurring queries within the TTL, it is likely an attack 22
  • 23. © Men & Mice http://menandmice.com One Solution: Response Rate Limiting (RRL) • response rate limiting counts the number of identical responses sent to a given network
 • will throttle outgoing responses if too much identical responses are sent
 • allows legit clients in the victims network to still resolve DNS data 23
  • 24. © Men & Mice http://menandmice.com One Solution: Response Rate Limiting (RRL) • in case an attack is detected, (almost) empty answers are sent with "TC" flag set
 • "TC" flag = answer truncated, retry over TCP
 • real caching DNS server will repeat the query over TCP (slower, but harder to spoof) 24
  • 25. © Men & Mice http://menandmice.com One Solution: Response Rate Limiting (RRL) •RRL enabled on an authoritative server 25
  • 26. © Men & Mice http://menandmice.com Demo: RRL 26
  • 27. © Men & Mice http://menandmice.com Miscellaneous news DHCP: Network Access Protection (NAP) has been removed from DHCPv4 in Windows Server 2016 Containers with Docker: lightweight separation of Applications on a single Windows Server 2016 instance (can be used to separate a DNS or DHCP server) Nano-Server: minimal Windows Server 2016 image without GUI. Can be used to create a lightweight DNS-Server deployment Software Defined Networking (SDN) and Layer-4 Load- Balancer: load-balance DNS server (for example DNS resolver) 27
  • 28. © Men & Mice http://menandmice.com Release Dates Windows Server 2016 will be released in Q3 2016 Men & Mice Suite 7.3 (September 2016) will support Windows Server 2016 Many of the new features will be supported in the Men & Mice GUI and Web-UI 28
  • 29. © Men & Mice http://menandmice.com Upcoming Webinar June 9th, 2016 - Yeti-DNS ! Yet-DNS - an international research project 
 on the DNS root-server system Interview with Shane Kerr of BII How-To participate in Yeti-DNS with a 
 DNS resolver 29
  • 30. © Men & Mice http://menandmice.com Thank you! ! Questions? Comments? 30